More to explore:

All Results

  • Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Network Administration, Exploitation techniques, Cybersecurity, Data Ethics, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines

  • LearnKartS

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Security Testing, Cyber Security Assessment, Cybersecurity, Network Security, Cyber Attacks, Cryptography, Vulnerability Scanning, Kubernetes, Application Security, Cloud Infrastructure, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Operations, Security Controls, Security Awareness, Cyber Risk, Security Strategy

  • Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

  • Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Security Testing, Network Security, Cyber Security Assessment, Cybersecurity, Cloud Computing, Cyber Attacks, Brute-force attacks, Exploitation techniques, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Wireless Networks

  • Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Cloud Security, Vulnerability Scanning, Security Testing, Network Security, Application Security, Vulnerability Assessments, Cybersecurity, Mobile Security, Wireless Networks, Human Factors (Security), Network Analysis, Linux, Technical Communication

  • Status: Top AI Program

    Skills you'll gain: Prompt Engineering, Prompt Patterns, ChatGPT, Generative AI, Responsible AI, Generative Model Architectures, IBM Cloud, AI Workflows, LLM Application, Workflow Management, AI literacy, No-Code Development, Machine Learning Software, Natural Language Processing, Business Workflow Analysis, Artificial Intelligence, Self Service Technologies, Machine Learning, Deep Learning, Data Science

What brings you to Coursera today?

  • Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)

  • Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Exploit development, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Security Testing, Scripting, Vulnerability Assessments, Hardening, Brute-force attacks, General Networking, Scripting Languages, Shell Script, Network Administration, Cybersecurity, Network Security

  • Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security

  • Skills you'll gain: AI Security, MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Digital Forensics, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Disaster Recovery, Cryptography, Incident Management, Responsible AI, DevOps

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Cyber Security Strategy, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Linux, Linux Administration